<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>jep</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Journal of Economics and Political Sciences(Türkiye)</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2792-0410</issn>
                                                                                            <publisher>
                    <publisher-name>Düzce Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Politics in International Relations</subject>
                                                            <subject>Security Studies</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Uluslararası İlişkilerde Siyaset</subject>
                                                            <subject>Güvenlik Çalışmaları</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>Tehditlerin Ortasında Güven: Bir Savunmacının Siber Güvenlik İkilemini Gidermeye Yaklaşımı</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Trust Amidst Threats: A Defender&#039;s Approach to Navigating the Cybersecurity Dilemma</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0008-5435-998X</contrib-id>
                                                                <name>
                                    <surname>Rugina</surname>
                                    <given-names>Juma Mdimu</given-names>
                                </name>
                                                                    <aff>SOCIAL SCIENCES UNIVERSITY OF ANKARA, INSTITUTE OF SOCIAL SCIENCES</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20231230">
                    <day>12</day>
                    <month>30</month>
                    <year>2023</year>
                </pub-date>
                                        <volume>3</volume>
                                        <issue>2</issue>
                                        <fpage>78</fpage>
                                        <lpage>92</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20231202">
                        <day>12</day>
                        <month>02</month>
                        <year>2023</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20231221">
                        <day>12</day>
                        <month>21</month>
                        <year>2023</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2021, Journal of Economics and Political Sciences(Türkiye)</copyright-statement>
                    <copyright-year>2021</copyright-year>
                    <copyright-holder>Journal of Economics and Political Sciences(Türkiye)</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>Bu makale, siber güvenlikte sıklıkla gözden kaçırılan çok önemli bir noktaya ilişkin savunucuların bakış açısına dayanmaktadır: Her siber saldırı, saldırı amaçlı değildir. Bazı izinsiz girişler gerçekten savunma amaçlıdır ve bir ulusun ağlarını koruması için gerekçeler sağlar. Makale, savunucuların dijital ağlarını siber tehditlere karşı korurken ülkeler arasında güven oluşturmak için kullandıkları stratejileri, zorlukları ve incelikleri ortaya çıkarmayı amaçlıyor. Savunucuların yaratıcılığının kalıcı doğasını, yetenekli rakipleri, yararlı tehdit istihbaratı toplarken karşılaşılan engelleri ve yetenekli ağ mimarisine ve savunuculara sahip olmanın önemini tartışıyor. Ana argüman, maksimum ağ güvenliğine ulaşmanın bazen, özellikle de iyi finanse edilen istihbarat teşkilatları gibi gelişmiş savunucular için, diğer ulusların ağlarına izinsiz girmeyi gerektirmesidir. Üst düzey savunucular, potansiyel rakiplerin dijital ağlarına ve bu rakiplerin hedef ağlarına sızarak siber güvenliklerini artırır. Bu izinsiz girişler aracılığıyla, başka yollarla erişilemeyecek değerli bilgileri elde ederler. Bu nedenle, ağa izinsiz girişlerin gerçekleştirilmesi, bir devletin siber güvenlik duruşunu geliştirmek için son derece faydalı hale gelir.</p></trans-abstract>
                                                                                                                                    <abstract><p>This paper is based on the defenders&#039; perspective on a crucial point often overlooked in cybersecurity: not every cyber intrusion is meant for attacking purposes. Some intrusions are truly defensive, providing justifications for a nation to protect its networks. The paper aims to reveal the strategies, challenges, and subtleties defenders use to build trust among nations while defending their digital networks against cyber threats. It discusses the enduring nature of defenders&#039; creativity, skilled adversaries, the obstacles presented when gathering useful threat intelligence, and the importance of having capable network architecture and defenders. The main argument is that achieving maximum network security sometimes requires intruding into other nation’s networks, especially for advanced defenders like well funded intelligence agencies. Top-tier defenders enhance their cybersecurity by infiltrating the digital networks of potential adversaries and the networks of targets for those adversaries. Through these intrusions, they acquire valuable information that may be inaccessible through other means. Therefore, conducting network intrusions becomes exceptionally beneficial for advancing a state&#039;s cybersecurity posture.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Cybersecurity</kwd>
                                                    <kwd>  Digital Networks</kwd>
                                                    <kwd>  Defenders</kwd>
                                                    <kwd>  Cybersecurity Dilemma</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Siber Güvenlik</kwd>
                                                    <kwd>  Dijital Ağlar</kwd>
                                                    <kwd>  Savunucuların Bakış Açısı</kwd>
                                                    <kwd>  Siber Güvenlik İkilemi</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Agbogun, J. B., &amp; Ejiga, F. A. (2013). Network security management: solutions to network intrusion related problems. International Journal of Computer and Information Technology, 2(4), 617-625.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Alberts, D. S., Garstka, J., &amp; Stein, F. P. (1999). Network centric warfare: Developing and leveraging information superiority (p. 167). Washington, DC: National Defense University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Amoroso, E. (2012). Cyber-attacks: protecting national infrastructure. Elsevier.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Andress, J., &amp; Winterfeld, S. (2013). Cyber warfare: techniques, tactics and tools for security practitioners. Elsevier.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Aoyama, T. (2019). Control Systems Security and Communication-Achieving Organizational Resilience through Exercise.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Betts, R. K. (2009). Enemies of intelligence: Knowledge and power in American national security. Columbia University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Bonfanti, M. E. (2022). Artificial intelligence and the offence-defence balance in cyber security. Cyber Security: Socio-Technological Uncertainty and Political Fragmentation. London: Routledge, 64-79.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Bronk, C. (2016). Cyber Threat: The Rise of Information Geopolitics in US National Security: The Rise of Information Geopolitics in US National Security. ABC-CLIO.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Buchanan, B. (2016). The cybersecurity dilemma: Hacking, trust, and fear between nations. Oxford University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Case, D. U. (2016). Analysis of the cyber-attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), 388(1-29), 3.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Chevalier, R. (2019). Detecting and Surviving Intrusions: Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches (Doctoral dissertation, CentraleSupélec).</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Donaldson, S., Siegel, S., Williams, C. K., &amp; Aslam, A. (2015). Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats. Apress.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Falco, G. J., &amp; Rosenbach, E. (2021). Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity. Oxford University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Gaitan, J. P. (2017). Strategic Counterintelligence: An Approach To Engaging Security Threats To American Security (Doctoral dissertation, Johns Hopkins University).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Gartzke, E., &amp; Lindsay, J. R. (2015). Weaving tangled webs: offense, defense, and deception in cyberspace. Security Studies, 24(2), 316-348.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Gill, T. D., &amp; Ziolkowski, K. (2013). Non-intervention in the cyber context. Peacetime Regime for State Activities in Cyberspace International Law. International Relations and Diplomacy. NATO CCDCOE, Tallinn, 217-238.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Goldsmith, J. (Ed.). (2022). The United States&#039; Defend Forward Cyber Strategy: A Comprehensive Legal Assessment. Oxford University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Harber, J. R. (2009). Unconventional spies: The counterintelligence threat from non-state actors. International Journal of Intelligence and CounterIntelligence, 22(2), 221-236.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Healey, J. (2019). The implications of persistent (and permanent) engagement in cyberspace. Journal of Cybersecurity, 5(1), tyz008.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Heath, T. R., &amp; Lane, M. (2019). Science-Based Scenario Design: A Proposed Method to Support Political-Strategic Analysis (p. 59). RAND.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Hood, L. M. (2019). US-German Defense Burden-Sharıng Sınce 2014: Collectıve Defense Or Free Rıder? (Doctoral dissertation, Monterey, CA; Naval Postgraduate School).</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Hutchins, E. M., Cloppert, M. J., &amp; Amin, R. M. (2011). Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare &amp; Security Research, 1(1), 80.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Jasper, S. (2018). US strategic cyber deterrence options (Doctoral dissertation, University of Reading).
Johnston, A. I., &amp; Ross, R. S. (Eds.). (2005). Engaging China: The management of an emerging power (Vol. 10). Routledge.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Kaur, S., &amp; Randhawa, S. (2020). Dark web: A web of crimes. Wireless Personal Communications, 112, 2131-2158.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Kesan, J. P., &amp; Hayes, C. M. (2014). Creating a circle of trust to further digital privacy and cybersecurity goals. Mich. St. L. Rev., 1475.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Kuipers, D., &amp; Fabro, M. (2006). Control systems cyber security: Defense in depth strategies (No. INL/EXT-06-11478). Idaho National Lab.(INL), Idaho Falls, ID (United States).</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Larson, D. W. (1997). Trust and missed opportunities in international relations. Political Psychology, 18(3), 701-734.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Lavorgna, A. (2020). Cybercrimes: Critical issues in a global context. Bloomsbury Publishing.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Leeds, B. A. (2003). Do alliances deter aggression? The influence of military alliances on the initiation of militarized interstate disputes. American Journal of Political Science, 47(3), 427-439.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Levine, J., LaBella, R., Owen, H., Contis, D., &amp; Culver, B. (2003, June). The use of honeynets to detect exploited systems across large enterprise networks. In IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003. (92-99). IEEE.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Liaropoulos, A. (2016). Exploring the complexity of cyberspace governance: state sovereignty, multi-stakeholderism, and power politics. Journal of Information Warfare, 15(4), 14-26.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Lin, H. S. (2010). Offensive cyber operations and the use of force. J. Nat&#039;l Sec. L. &amp; Pol&#039;y, 4, 63.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Lindsay, J. R. (2015). Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53-67.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Lindsay, J. R. (2021). Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem. Intelligence and National security, 36(2), 260-278.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Lindsay, J. R., Cheung, T. M., &amp; Reveron, D. S. (Eds.). (2015). China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford University Press, USA.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">Lord, K. M. (2012). The perils and promise of global transparency: Why the information revolution may not lead to security, democracy, or peace. State University of New York Press.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Lucas, G. R. (2017). Ethics and cyber warfare: the quest for responsible security in the age of digital warfare. Oxford University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Malagutti, M. A. (2016). State-sponsored cyber-offences. Revista da EGN, 22(2), 261-290.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Mitnick, K. D., &amp; Simon, W. L. (2009). The art of intrusion: the real stories behind the exploits of hackers, intruders and deceivers. John Wiley &amp; Sons.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Porch, D. (2013). Counterinsurgency: Exposing the myths of the new way of war. Cambridge University Press.
Prieto, D. (2006). Information sharing with the private sector. Seeds of Disaster, Roots of Response. How Private Action Can Reduce Public Vulnerability, 404-428.</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">Rattray, G. J. (2001). Strategic warfare in cyberspace. MIT press.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">Riordan, S. (2018). The Geopolitics of Cyberspace: A Diplomatic Perspective. Brill Research Perspectives in Diplomacy and Foreign Policy, 3(3), 1-84.</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">Rudner, M. (2013). Cyber-threats to critical national infrastructure: An intelligence challenge. International Journal of Intelligence and CounterIntelligence, 26(3), 453-481.</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">Sabillon, R., Cavaller, V., &amp; Cano, J. (2016). National cyber security strategies: global trends in cyberspace. International Journal of Computer Science and Software Engineering, 5(5), 67.</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">Samuel-Azran, T. (2013). Al-Jazeera, Qatar, and new tactics in state-sponsored media diplomacy. American behavioral scientist, 57(9), 1293-1311.</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">Schreier, F., &amp; Caparini, M. (2005). Privatising security: Law, practice and governance of private military and security companies (Vol. 6). Geneva: DCAF.</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., &amp; Kambhampati, S. (2020). A survey of moving target defenses for network security. IEEE Communications Surveys &amp; Tutorials, 22(3), 1909-1941.</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">Singer, P. W., &amp; Friedman, A. (2014). Cybersecurity: What everyone needs to know. oup usa.</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">Singh, B. (2011). Network Security and Management. PHI Learning Pvt. Ltd.</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">Skopik, F., Settanni, G., &amp; Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers &amp; Security, 60, 154-176.</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">Spafford, E. H., Metcalf, L., &amp; Dykstra, J. (2023). Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us. Addison-Wesley Professional.</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">Steingartner, W., Galinec, D., &amp; Kozina, A. (2021). Threat defense: Cyber deception approach and education for resilience in hybrid threats model. Symmetry, 13(4), 597.</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., &amp; Lopez, J. (2018). A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Communications Surveys &amp; Tutorials, 20(4), 3453-3495.</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">Theohary, C. A. (2018). Information warfare: Issues for congress. Congressional Research Service, 7-5700.</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">Val Sánchez, K. V., &amp; Akyesilmen, N. (2021). Competition for High Politics in Cyberspace: Technological Conflicts Between China and the USA. Polish Pol. Sci. YB, 50, 43.</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">Waters, L. A. (2005). Secrecy, deception and intelligence failure: explaining operational surprise in war (Doctoral dissertation, Massachusetts Institute of Technology).</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">Weinberger, C. W. (1985). US defense strategy. Foreign Aff., 64, 675.</mixed-citation>
                    </ref>
                                    <ref id="ref58">
                        <label>58</label>
                        <mixed-citation publication-type="journal">Wendt, D. W. (2020). Exploring the strategies cybersecurity specialists need to improve adaptive cyber defenses within the financial sector: An exploratory study (Doctoral dissertation, Colorado Technical University).</mixed-citation>
                    </ref>
                                    <ref id="ref59">
                        <label>59</label>
                        <mixed-citation publication-type="journal">Yuan, W., Zhao, L., &amp; Zeng, B. (2014). Optimal power grid protection through a defender–attacker–defender model. Reliability Engineering &amp; System Safety, 121, 83-89.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
